Physical Access Control Systems and FIPS 201 Physical Access Council Smart Card Alliance December 2005

Size: px
Start display at page:

Download "Physical Access Control Systems and FIPS 201 Physical Access Council Smart Card Alliance December 2005"

Transcription

1 Physical Access Control Systems and FIPS 201 Physical Access Council Smart Card Alliance December 2005 Copyright 2006 Smart Card Alliance, Inc. All rights reserved. 1

2 Topics Introduction: PACS Overview PIV Card PACS-Related Components PACS Readers PACS Panels & Hosts (Servers) PACS Infrastructure (Cabling, Communications and Interfaces) PACS & Biometrics Privilege Granting & Revocation PACS Certification & Accreditation Conclusions 2

3 Introduction: Traditional PACS System operator verifies an employee s identity according to organizational policy User credential is created and enrolled at PACS enrollment station Credential data and access privileges are downloaded to controllers database Readers at control points read data from credential and send data to controller for access decision 3

4 1 Employee Enrolls Introduction: PIV Identity Verification and Issuance 2 Employer/ Sponsorship Employee Application 5 3 Approval Authority Identity Management System (IDMS) 6 Identity Verification 1:n 1:n biometric biometric search search Confirm Confirm employment employment ID ID validation validation through through standard standard government-wide government-wide services services (HSPD-11) (HSPD-11) Government Government databases databases Threat Threat risk risk 4 Enrollment 8 7 Card Production & Personalization PKI Infrastructure Issuer - Card Activation PIV Activated for Operational Use 4

5 Introduction: FIPS 201 PACS Relationship ID Records Personnel Data Card Management System Certificate Authority Bridge-Certified CA Identity Management System (IDMS) Employee A PIV cardholder arrives OCSP (or other means) confirms with IDMS that credential is still valid Enrollment officer confirms ID with PIV and biometrics Enrollment officer confirms access requirements PACS enrollment officer adds PIV card CHUID to PACS PACS enrollment officer registers physical access privileges to PACS Uses low or medium assurance profile PACS performs periodic validity checks with IDMS 5

6 Physical Access Control Systems and FIPS 201: PIV Card Components Physical Access Council Smart Card Alliance 6

7 PIV Card Issues/Recommendations FASC-N Usage Requirements How many of the FASC-N BCD digits (14 up to 32) need to be read/processed to be considered FIPS 201 compliant? Since PACS v2.2/2.3 states that a minimum of the first 14 BCD digits (Agency Code, System Code, and Credential Number) need to be used to ensure a unique number across the Federal Government, this should be the minimum required for FIPS 201 compliance. GUID Usage Requirements Cannot currently be relied on to be a unique number across the Federal Government. Guidance should be provided to PIV Issuers on using unique IPv6 addresses for the GUID. Since there is no currently established standard for assigning a GUID and its uniqueness cannot be ensured, it should only be used locally. 7

8 PIV Card Issues/Recommendations GUID Usage Requirements What is the timeframe for implementing this? Since OMB policy has set June 2008 as the date by which all agencies infrastructure (network backbones) must be using IPv6 and agency networks must interface with this infrastructure, this should be the target implementation date. Work should begin as early as possible to meet this target implementation date. Expiration Date Usage Requirements When and/or how often does this need to be checked? The PIV card contains multiple expiration dates (e.g., printed on the PIV card, inside CHUID, printed info buffer (optional), within PKI certificates). Expiration dates need to be synchronized. This should initially only need to be checked/validated at the time of initial registration and not at each access control event. 8

9 PIV Card Issues/Recommendations CHUID Asymmetric Signature Usage Requirements - When and/or how often does this need to be checked? The CHUID asymmetric signature should initially only need to be checked/validated at the time of initial registration and not at each access control event. At some later time this could be expanded as infrastructure matures. Card Authentication Key Usage Requirements - When and/or how should asymmetric keys be used in PACS? PACS 2.2/2.3 includes the use of symmetric keys for PACS in the high assurance profile, but does not include the use of asymmetric keys mentioned in FIPS 201 and SP To ensure interoperability, this needs to be made mandatory and the PACS document must be updated to include this as a PKI high assurance profile. 9

10 PKI High Assurance Profile: Strong, Standards-based Token Authentication Physical Access Council Smart Card Alliance 10

11 Recommendation and Benefits to Use Certificates for Authentication Uses industry standard and FIPS 201 compliant authentication methods with x.509 certificates (Card Authentication Certificate) Uses asymmetric authentication that is already required to read CHUID signature (no additional requirements for reader functionality) Provides acceptable physical access performance with dual-interface credentials Card Authentication Certificate does not require use of PIN for high throughput physical access applications Provides common solution across Federal agencies Eliminates key management issues with Shared Secret Keys 11

12 Current PACS 2.2/2.3 Authentication Profiles CHUID Low Assurance Free read data, sent to panel Small volume of data Low anti-counterfeiting, low anti-tampering CHUID Medium Assurance Free read data, subset sent to panel Medium volume of signed data Low to medium (with security guard observation) anti-counterfeiting, higher antitampering CHUID High Assurance Authentication key stored on card Key verified by readers/panels holding Site Secret Key (SSK) Can t use on a reader without a copy of an SSK Compromise of an SSK could permit batch counterfeiting SSK distribution/management challenges 12

13 PKI High Assurance Profile On-card generation of private key (RSA, ECC) Public key bound to card/fasc-n in X.509 certificate Standard card authentication certificate from SP , certificate profile from FICC Card verification without shared secrets (no SSK) Highest anti-counterfeiting Interoperation with logical security uses 13

14 PKI High Assurance Notes PKI-capable cards required (e.g., current dualinterface cards) Readers (or bi-directional panels) with real time clock and RSA/ECC signature verification required to use certificates (i.e., same level required for CHUID verification in medium profile) No on-card second factors (PIN, biometric) required for contactless use. Second/third factors would require use of contact interface (on-card) or panel-side match (i.e., same as the other profiles) 14

15 Physical Access Control Systems and FIPS 201: PACS Readers Physical Access Council Smart Card Alliance 15

16 PACS Readers: FIPS 201 Requirements FIPS 201 defaults to PACS 2.2 for access control low, medium and high assurance profiles. There is not a requirement to read and output the entire CHUID to open a door. Reading the entire CHUID would add more time to the actual transaction and could not all be processed by modern day access control systems. Enough information should be read to output either the FASC-N or the GUID and to be able to calculate the HMAC for a higher level of assurance. If the highest assurance security level is required, the reader will also need to be capable of symmetric or asymmetric keying. Another option would be passing the card certificate from the contact chip. Whether ISO is used for contactless or ISO 7816 is used for contact chips, output to the access control panels should remain the same since the same CHUID data is used through either interface. Read speed is not believed to be an issue if the system is only reading and outputting the FASC-N/GUID alone or with the HMAC. Read speed may be an issue with reading/verifying very large biometric images or meeting higher security assurance profiles. 16

17 PACS Readers: Issues/Recommendations FIPS 201 defaults to PACS2.2 for access control, low, medium and high assurance profiles. NIST should consider updating FIPS 201 to reference PACS 2.3 or latest update. Readers can be configured to output many different configurations to the panel. The data that is output will be dependent on whether the agency is working with a legacy installation or new installation. For legacy installations, each access control vendor s system is different and may initially require different data imported from the reader. For new installations, a minimum set of data to be passed from the FASC-N or GUID should be specified (e.g., 16 GUID digits). 17

18 PACS Readers: Issues/Recommendations There has been no clear guidance from NIST or any government agency or committee on whether an access control card reader needs to go through conformance testing. There is an absolute need for NIST or some governing agency to publish a test data model set for an entire CHUID. Without an official data model set to test with, no reader vendor can truly build and test products to meet the SP "End Point" solution. This is an absolute must for the industry to deliver product in a timely manner. 18

19 Physical Access Control Systems and FIPS 201: PACS Panels and Hosts (Servers) Physical Access Council Smart Card Alliance 19

20 PACS Panels & Hosts: Overview FIPS 201 does not specify requirements related to the physical access control system. Implementation is manufacturer specific. Interoperability between PACS is not part of FIPS and therefore still open to interpretation by individual agencies. There is a lack of formal protocol or standardization for the interface between PACS and IDMS. Industry should define the interoperability standard to support FIPS 201 functionality. 20

21 PACS Panels: Overview Panels are configured by head-end (host), but can work standalone in offline mode to control door access. High throughput is required (e.g., turnstiles at start of shift). Cardholders are identified by matching card data from readers to cardholder data in panel database. Additional checks can be made on expiration date (either from card or from head end) and PIN. Connection to readers: Readers are connected to panel via Wiegand, RS-232/422/485, or other wired interface. Connection to head-end Card holder record including FASC-N fields or GUID, PACS expiration date, PIN, clearances 21

22 PACS Panels & Reader Data There is a need to specify what data to use: FASC-N data or the full GUID. There are multiple data formats supported by the various reader vendors (e.g., 200-bit, 128-bit, 64-bit, 40-bit) For full interoperability across agencies, the reader FASC-N data should minimally include the following (14 digits) Agency (4 digits) System (4 digits) Credential (6 digits) For legacy applications, a fewer number of digits can be output, but the number will not be unique across Federal agencies and must be assessed for risk by local security manager. Optionally, for medium security applications, the reader can also output a Hashed Message Authentication Code (HMAC) which is used to verify that the card has not been modified since cardholder enrollment into the PACS Optionally, the reader can also output the card s expiration date 22

23 PACS Hosts (Servers): Overview The PACS host is the primary application for configuring, controlling, and disseminating information about the access infrastructure (particularly controlled doors) and the cardholders who have access privileges to those doors. The host has a configuration database, a cardholder database, administrative functions for configuring doors, readers, panels, clearances, schedules, cardholders, and other various features. All configuration activity is journaled for audit purposes. The host communicates to administrative clients, guard/monitoring station clients, and panels The host interfaces to the IDMS and other enrollment systems. 23

24 PACS Hosts: Cardholder Database Name Privileges Clearances Card number data FASC-N data fields and/or GUID HMAC for medium security Other user-defined fields Expiration date Picture (This does not have to be in the database, but can be the path of a picture file.) 24

25 PACS Hosts: Cardholder Enrollment Enrollment GUI in the admin client allows data to be entered manually. Methods to interface to other applications IDMS used to issue the badge Local enrollment application where cardholders present their badges the first time they access the facility. A reader would read the card and populate the cardholder database with the data encoded on the card. A revocation list monitoring application can un-enroll a cardholder who appears on the revocation list. 25

26 Physical Access Control Systems and FIPS 201: PACS Infrastructure (Cabling, Communications & Interfaces) Physical Access Council Smart Card Alliance 26

27 PACS Infrastructure: Issues / Recommendations C CR CRI CARD CARD READER CARD READER INTERFACE Interface Points 1,2,3: Could be combined ACP Local Database ACCESS CONTROL PANEL LAN/WAN ADMIN or CLIENT WORKSTATION Relevant Issue: FIPS compliance does not imply PACS compliance and therefore confusion will result ; what is compliance? Recommendation: Minimum specifications for reader output should be more clearly defined based on open standards Relevant Issue: One way or two way reader communications with ACP Recommendation: Two way communications with readers are possible (and now also with Weigand data) and more secure but not addressed. Tools to crack Weigand available. Relevant Issue: Intelligent readers do not prevent physical attacks Recommendation: Employ tamper mechanisms to avoid physical attacks and provide guidance on door and hardware specs for high assurance applications 5 LAN/WAN IDMS PACS Server/ Database 27

28 PACS Infrastructure: Issues / Recommendations C CR CRI CARD CARD READER Interface Point 2 Could be combined CARD READER INTERFACE ACP Local Database ACCESS CONTROL PANEL LAN/WAN ADMIN or CLIENT WORKSTATION Relevant Issue: No established definition of a FIPS reader Recommendation: Provide fundamental interface requirements to permit minimum (open standards based) criteria for establishing basic output specs for compliant readers Relevant Issue: Degree or level of compatibility of FIPS compliant readers is not defined. How compatible is it? Recommendation: Establish levels of compatibility and compliance which are commensurate with the communications requirements to achieve low, medium and high assurance profiles; include guidance on one-way or two-way communications if necessary to comply with high assurance and PKI applications 5 LAN/WAN IDMS PACS Server/ Database 28

29 PACS Infrastructure: Issues / Recommendations C CR CRI CARD CARD READER Could be combined CARD READER INTERFACE Interface Point 2 cont d ACP Local Database ACCESS CONTROL PANEL LAN/WAN ADMIN or CLIENT WORKSTATION Relevant Issue: No established minimum outputs for compatibility with legacy systems Recommendation: Establish minimum default settings for legacy systems (based on standards) as well as minimum outputs to meet minimum future GUID requirements 5 LAN/WAN PACS Server/ Database IDMS 29

30 PACS Infrastructure: Issues / Recommendations C CR CRI CARD CARD READER Interface Point 3 Could be combined CARD READER INTERFACE ACP Local Database ACCESS CONTROL PANEL LAN/WAN ADMIN or CLIENT WORKSTATION Relevant Issue: Lack of security between reader and panel provides a weak link for PACS. RS232, RS485 & current loop are established asynchronous bi-directional forms of communications standards and can be made secure but are not addressed in any current guideline documents Recommendation: Consider encryption for medium and/or high assurance applications Relevant Issue: Card reader interface to ACP is typically proprietary Recommendation: Emphasis should be on CRI to card reader for open standards and minimum data requirements set for legacy systems and with migration guidelines for future proofing such as requirements for the GUID 5 LAN/WAN IDMS PACS Server/ Database 30

31 C CR CRI CARD 1 2 CARD READER PACS Infrastructure: Issues / Recommendations CARD READER INTERFACE Interface Point 4/5 Could be combined 3 ACP Local Database ACCESS CONTROL PANEL 4 4 LAN/WAN ADMIN or CLIENT WORKSTATION 5 LAN/WAN PACS Server/ Database Relevant Issue: Data fields within the schema of the PACS database server are not identified and may not correlate to those in the CHUID fields for easy migration to the host from the IDMS. Every system will therefore have to be customized at a cost Recommendation: Establish a minimum set of data to be imported and the method of transfer for standardization (for example, XML). All systems would have same set Relevant Issue: There is much confusion on what is open and what is IDMS proprietary when PACS systems are evaluated and purchases are made on beliefs and assumptions Recommendation: Clearly define what portions of the PACS are to be based on open standards and what does not have to be 31

32 Physical Access Control Systems and FIPS 201: Biometrics Smart Card Alliance Physical Access Council 32

33 Biometrics An access control reader with biometric capability is required for assurance levels of high confidence or very high confidence NIST Special Publication provides interoperable biometric data specification for storage on the PIV card Requires storage of minutiae templates from two index fingerprints Templates must comply with ANSI-INCITS 378 standard Alternative fingers are allowed if index fingers cannot be imaged SP is in draft mode and is still subject to change 33

34 Biometrics: Issues/Recommendations Use of contact readers and PIN entry for release of the mandatory fingerprint templates may not be appropriate for PACS due to throughput performance requirements or environmental requirements Use of alternative biometric paradigms for contactless operation is not precluded in FIPS 201 However, such implementations may not be interoperable with other agencies Examples of alternative biometric paradigms include: Different modalities (e.g., fingerprint, iris, face, hand geometry, etc.) Store on card match on reader (agency specific PIV container) Store on server match on server (CHUID acts as pointer to biometric record in external database) Store on card match on card (PIN replacement option) 34

35 Biometrics: Issues/Recommendations If fingerprint templates are used for alternative authentication paradigms, they should comply with the INCITS 378 standard (as defined in SP ) to allow interoperability with various manufacturer s hardware sensors and algorithms that may be used within an agency If biometric templates are stored off the PIV card, consider the requirement for an external communications link from PACS reader PIN entry or contact reader is not required if an alternative biometric paradigm is chosen 35

36 Physical Access Control Systems and FIPS 201: Privilege Granting and Revocation Physical Access Council Smart Card Alliance 36

37 Privilege Granting and Revocation PACS privileges (authorizations) for PIV cardholders are granted and revoked based on local security policies. The biggest issue related to granting privileges is trust in the PIV cardholder s identity. This trust can be established at varying levels of assurance through the FIPS 201 PIV authentication mechanisms. Asymmetric key related authentication mechanisms require network connectivity to CRLs and/or OCSP responders. Continued trust in the PIV card requires that the issuing agency support the card s validity by distributing or providing access to pertinent status change information. 37

38 Privilege Granting and Revocation PACS revocation pertains to the revocation of privileges and not the revocation of a PIV card. PACS privileges can be revoked even though the PIV card has not been revoked, but PACS privileges should be revoked if the PIV card (PIV authentication certificate) is revoked. Automated PACS privilege revocation for revoked PIV cards is not mandatory, but is recommended. Automated PACS privilege revocation based on a revoked PIV authentication certificate requires network connectivity to the PKI infrastructure (e.g., CRLs and/or OCSP responders). There is no requirement that each access point triggers a credential status request, as long as the PACS is updated according to agency-specific FIPS 201-compliant procedures. 38

39 Privilege Granting and Revocation System processes that update and synchronize PIV card status in affected PACS databases are essential. In addition to CRLs and OCSP responses, a PIV card hotlist could be maintained on some or all revoked or terminated PIV cards. This hotlist could be made accessible online or could be distributed on a scheduled basis (e.g., hourly, daily). For added security, the hotlist could be digitally signed by its issuer/maintainer. FIPS 201 mandates a maximum 18 hour update of CRLs, which should be the maximum update time for the hotlist. In cases where 18 hours is an unacceptable delay, alternate procedures must be implemented to disseminate this information within a shorter and acceptable timeframe. 39

40 Physical Access Control Systems and FIPS 201: Certification & Accreditation Physical Access Council Smart Card Alliance 40

41 PACS Products Issues GSA has not published a methodology for PACS equipment to be on its approved product list. It is recommended that GSA only certify the PACS readers. The PACS system vendors need GSA-approved transitional and endstate smart card samples encoded with the finalized data model to do system development and testing. Contactless reader approval process need to conform to the current ISO/IEC standard. Industry (e.g., SIA, NFPA, UL) needs to define interoperability standards to support FIPS 201 and other functionality Communications security: reader-panel, panel-panel, panel-host, hosthost Interoperability: Host-host communication, ODBC, XML, common database format (issuer authentication, camera call up, visitor management systems) 41

42 Facility Security Guidance There is no defined guidance to inform agencies about what level of equipment should be purchased Equipment selection criteria needs to be based on the accreditation level that the facility needs. The PACS needs to be configured to support the accreditation level. Throughput - transactions per second (card reads, alarm events, panel down/up loads) - needs to be part of the design criteria. Legacy PACS and interoperability Majority of legacy PACS can support a single agency PIV2 credential using the FASC-N by upgrading the PACS readers and host software. At this time, support for end state cards with IPv6 addresses used as global unique IDs has not been developed by the majority of PACS vendors. 42

43 Certifying PACS The Authority Having Jurisdiction (AHJ) will have a number of overlapping regulations that the PACS will need to be certified to meet: Physical security IT security Life safety PIV processes The AHJ will have to develop a program to maintain the certification & accreditation Facilities would receive certification & accreditation Low: self-certify Medium, High: third-party certify 43

44 Physical Access Control Systems and FIPS 201: Conclusions Physical Access Council Smart Card Alliance 44

45 Conclusions FIPS 201 and associated NIST special publications and guidance from the OMB, GSA and IAB PAIIWG provide an excellent framework for deploying an interoperable secure ID credential, addressing many of the issues about FIPS 201 and PIV card implementation Key open areas needing guidance Usage requirements for PIV card data elements (FASC-N, GUID, CHUID expiration date, asymmetric signature, card authentication key) CHUID test data model set Conformance testing or specification for access control readers Specifications and standards for PACS interface points to reflect FIPS interoperability and security requirements Biometrics: use of biometrics over contactless interface Enrollment and revocation: Methods for synchronizing PIV card status and PACS databases Methodology for adding PACS products to GSA approved products list Guidance for agencies on level of equipment needed to support facility accreditation level Certification and accreditation of PACS 45

46 Conclusion The Smart Card Alliance Physical Access Council is focused on helping agencies understand how to implement PIV cards and deploy FIPS 201 compliant PACS Follow-on Smart Card Alliance efforts include: Working with NIST, OMB, GSA, IAB, PAIIWG, SIA and IBIA on updates to specifications and guidance going forward Providing educational workshops on HSPD 12 and FIPS 201 implementation 46

47 Physical Access Council Mission: Accelerating the widespread acceptance, usage, and application of smart card technology for physical access control Participation from 48 Smart Card Alliance member organizations Other resources FIPS 201 and Physical Access Control: An Overview of the Impact of FIPS 201 on Federal Physical Access Control Systems white paper, published Sept FIPS 201 resources web page 47

48 Physical Access Council Participants in FIPS 201 and PACS issues project Tim Baldridge, NASA Simon Barnes, Indala Calai Bhoopathi, SCM Microsystems Tom Casey, DHS Sal D Agostino, CoreStreet Tony Damalas, Actcom Mike Davis, HID Corp. Dave Engberg, CoreStreet Paul Evans, Booz Allen Hamilton Robert Fee, LEGIC Identsystems Bob Gilson, DoD Walter Hamilton, SafLink/IBIA Steve Hopper, Infogard Steve Howard, IDTP Eric Joseph, Lenel Won Jun, G&D Mike Kelley, BearingPoint Russ Kent, EDS Lolie Kull, DHS Irene Lam, Tyco Software House Erik Larsen, Lenel Philip Lee, Identity Alliance Stafford Mahfouz, ADT Cathy Medich, Smart Card Alliance Bob Merkert, SCM Microsystems Mike Miley, SAIC Ram Mohan, Northrop Grumman Cathy Mrosko, SIA LJ Neve, Maximus Dwayne Pfeiffer, Northrop Grumman JC Raynon, SCM Microsystems Mike Regalski, Lenel Patrick Rodwell, Lenel Roger Roehr, BearingPoint Steve Rogers, Integrated Engineering Adam Shane, AMAG Technology Jim St. Pierre, MDI Jeffrey Stephens, EDS Dario Stipisic, DoD Chris Stotts, Cubic Michael Sulak, US Dept. of State Lars Suneborn, HIRSCH Electronics Rod Taylor, US Dept. of Justice Radu Tenenbaum, Tyco Software House Beth Thomas, Honeywell Steve Treado, NIST Mark Visbal, SIA Steve Weyman, Infogard Eric Widlitz, HID Corp. Rob Zivney, HIRSCH Electronics 48

49 For More Information Physical Access Council Bob Merkert, SCM Microsystems, Council Chair - rmerkert@scmmicro.com Dwayne Pfeiffer, Northrop Grumman, Council Vice Chair - dwayne.pfeiffer@ngc.com Steve Rogers, Integrated Engineering, Council Secretary - steve@smart-id.com Smart Card Alliance Randy Vanderhoof, rvanderhoof@smartcardalliance.org Cathy Medich, cmedich@smartcardalliance.org 49

Physical Access Control Systems and FIPS 201

Physical Access Control Systems and FIPS 201 Physical Access Control Systems and FIPS 201 Physical Access Council Smart Card Alliance December 2005 1 This presentation was developed by the Smart Card Alliance Physical Access Council. The goals of

More information

Considerations for the Migration of Existing Physical Access Control Systems to Achieve FIPS 201 Compatibility

Considerations for the Migration of Existing Physical Access Control Systems to Achieve FIPS 201 Compatibility Considerations for the Migration of Existing Physical Access Control Systems to Achieve FIPS 201 Compatibility A Smart Card Alliance Physical Access Council White Paper Publication Date: September 2006

More information

FIPS 201 PIV II Card Use with Physical Access Control Systems: Recommendations to Optimize Transaction Time and User Experience May 2007

FIPS 201 PIV II Card Use with Physical Access Control Systems: Recommendations to Optimize Transaction Time and User Experience May 2007 FIPS 201 PIV II Card Use with Physical Access Control Systems: Recommendations to Optimize Transaction Time and User Experience May 2007 Developed by: Smart Card Alliance Physical Access Council 1 About

More information

Biometric Use Case Models for Personal Identity Verification

Biometric Use Case Models for Personal Identity Verification Biometric Use Case Models for Personal Identity Verification Walter Hamilton International Biometric Industry Association & Saflink Corporation Smart Cards in Government Conference Arlington, VA April

More information

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Who Am I? How do you know? 2 TWIC Program Vision A high-assurance identity credential that

More information

Smart Card Alliance Comments and Considerations on Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

Smart Card Alliance Comments and Considerations on Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance Smart Card Alliance Comments and Considerations on Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance This document offers Smart Card Alliance comments on the

More information

Interagency Advisory Board Meeting Agenda, February 2, 2009

Interagency Advisory Board Meeting Agenda, February 2, 2009 Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,

More information

State of the Industry and Councils Reports. Access Control Council

State of the Industry and Councils Reports. Access Control Council State of the Industry and Councils Reports Access Control Council Chairman: Lars R. Suneborn, Sr. Manager, Technical Marketing, Government ID, Oberthur Technologies Property of the Smart Card Alliance

More information

Using the Prototype TWIC for Access A System Integrator Perspective

Using the Prototype TWIC for Access A System Integrator Perspective Using the Prototype TWIC for Access A System Integrator Perspective AAPA Port Security Seminar and Exhibition, Seattle, WA July 19, 2006 Management and Technology Consultants The Challenge How do I manage

More information

Interagency Advisory Board Meeting Agenda, Wednesday, February 27, 2013

Interagency Advisory Board Meeting Agenda, Wednesday, February 27, 2013 Interagency Advisory Board Meeting Agenda, Wednesday, February 27, 2013 1. Opening Remarks 2. Discussion on Revisions Contained in Draft SP 800-63-2 (Bill Burr, NIST) 3. The Objectives and Status of Modern

More information

Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012

Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012 Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. Revision of the Digital Signature Standard (Tim Polk, NIST) 3. Update on Content

More information

IAB Minutes Page 1 of 6 April 18, 2006

IAB Minutes Page 1 of 6 April 18, 2006 IAB Minutes Page 1 of 6 The Interagency Advisory Board (IAB) meeting convened on Tuesday, April 17, 2006 at 9:15 AM at the Sheraton National Hotel in Arlington. After opening remarks by Randy Vanderhoof

More information

Multiple Credential formats & PACS Lars R. Suneborn, Director - Government Program, HIRSCH Electronics Corporation

Multiple Credential formats & PACS Lars R. Suneborn, Director - Government Program, HIRSCH Electronics Corporation Multiple Credential formats & PACS Lars R. Suneborn, Director - Government Program, HIRSCH Electronics Corporation Insert Company logo here A Smart Card Alliance Educational Institute Course Multiple credential

More information

FIPS and NIST Special Publications Update. Smart Card Alliance Webinar November 6, 2013

FIPS and NIST Special Publications Update. Smart Card Alliance Webinar November 6, 2013 FIPS 201-2 and NIST Special Publications Update Smart Card Alliance Webinar November 6, 2013 Today s Webinar Topics & Speakers Introductions: Randy Vanderhoof, Executive Director, Smart Card Alliance FIPS

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual

More information

Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS

Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS Introduction The expectations and requirements on government contracts for safety and security projects

More information

TWIC / CAC Wiegand 58 bit format

TWIC / CAC Wiegand 58 bit format This document was developed by the Smart Card Alliance Physical Access Council to respond to requests for sample Wiegand message formats that will handle the additional fields of the Federal Agency Smart

More information

Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP (HSPD 12) in a Trusted FICAM Platform

Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP (HSPD 12) in a Trusted FICAM Platform Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP 800 116 (HSPD 12) in a Trusted FICAM Platform In Partnership with: Introduction Monitor Dynamics (Monitor)

More information

FiXs - Federated and Secure Identity Management in Operation

FiXs - Federated and Secure Identity Management in Operation FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems

More information

Interagency Advisory Board Meeting Agenda, Tuesday, November 1, 2011

Interagency Advisory Board Meeting Agenda, Tuesday, November 1, 2011 Interagency Advisory Board Meeting Agenda, Tuesday, November 1, 2011 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. FIPS 201-2 Update and Panel Discussion with NIST Experts in Q&A Session (Bill MacGregor

More information

Interagency Advisory Board Meeting Agenda, Wednesday, June 29, 2011

Interagency Advisory Board Meeting Agenda, Wednesday, June 29, 2011 Interagency Advisory Board Meeting Agenda, Wednesday, June 29, 2011 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. Using PKI to Mitigate Leaky Documents (John Landwehr, Adobe) 3. The Digital Identity

More information

Interagency Advisory Board (IAB) Meeting. January 18, 2006

Interagency Advisory Board (IAB) Meeting. January 18, 2006 Interagency Advisory Board (IAB) Meeting January 18, 2006 Agenda Introduction - Mike Butler (DoD) HSPD-12 RFI Judy Spencer (GSA) GSA FIPS-201 Evaluation Program April Giles (GSA) Authentication Schema

More information

g6 Authentication Platform

g6 Authentication Platform g6 Authentication Platform Seamlessly and cost-effectively modernize a legacy PACS to be HSPD-12 compliant l l l l Enrollment and Validation Application Authentication Modules Readers HSPD-12 Enrollment

More information

Secure Solutions. EntryPointTM Access Readers TrustPointTM Access Readers EntryPointTM Single-Door System PIV-I Compatible Cards Accessories

Secure Solutions. EntryPointTM Access Readers TrustPointTM Access Readers EntryPointTM Single-Door System PIV-I Compatible Cards Accessories Secure Solutions l l l l BridgePointTM solutions that will take your security system to the next level EntryPointTM Access Readers TrustPointTM Access Readers EntryPointTM Single-Door System PIV-I Compatible

More information

IMPLEMENTING AN HSPD-12 SOLUTION

IMPLEMENTING AN HSPD-12 SOLUTION IMPLEMENTING AN HSPD-12 SOLUTION PAVING THE PATH TO SUCCESS Prepared by: Nabil Ghadiali 11417 Sunset Hills Road, Suite 228 Reston, VA 20190 Tel: (703)-437-9451 Fax: (703)-437-9452 http://www.electrosoft-inc.com

More information

Interagency Advisory Board Meeting Agenda, April 27, 2011

Interagency Advisory Board Meeting Agenda, April 27, 2011 Interagency Advisory Board Meeting Agenda, April 27, 2011 1. Open Remarks (Mr. Tim Baldridge, IAB Chair) 2. FICAM Plan for FIPS 201-2 (Tim Baldridge, IAB Chair and Deb Gallagher, GSA) 3. NSTIC Cross-Sector

More information

Leveraging HSPD-12 to Meet E-authentication E

Leveraging HSPD-12 to Meet E-authentication E Leveraging HSPD-12 to Meet E-authentication E Policy and an update on PIV Interoperability for Non-Federal Issuers December 2, 2008 Chris Louden IAB 1 Leveraging HSPD-12 to Meet E-Authentication E Policy

More information

Recommendation on the Credential Numbering Scheme for the FIPS 201 PIV Card Global Unique Identifier

Recommendation on the Credential Numbering Scheme for the FIPS 201 PIV Card Global Unique Identifier Recommendation on the Credential Numbering Scheme for the FIPS 201 PIV Card Global Unique Identifier A Smart Card Alliance Physical Access Council White Paper Publication Date: March 2009 Publication Number:

More information

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008 Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal

More information

IAB Minutes Page 1 of 6 January 18, 2006

IAB Minutes Page 1 of 6 January 18, 2006 IAB Minutes Page 1 of 6 The Interagency Advisory Board (IAB) meeting convened on Wednesday, January 18, 2005 at 9:00 AM in the GSA Auditorium. The meeting was chaired by Mike Butler. After his introductory

More information

(PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US

(PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US (PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US Brian A. Kowal, cryptovision cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com

More information

DHS ID & CREDENTIALING INITIATIVE IPT MEETING

DHS ID & CREDENTIALING INITIATIVE IPT MEETING DHS ID & CREDENTIALING INITIATIVE IPT MEETING October 14, 2004 Part 02 of 02 IMS/CMS Functional Specification General Issuance Requirements Issue a GSC-IS 2.1 compliant dual chip hybrid ICC/DESFire v0.5

More information

Helping Meet the OMB Directive

Helping Meet the OMB Directive Helping Meet the OMB 11-11 Directive March 2017 Implementing federated identity management OMB Memo 11-11 Meeting FICAM Objectives Figure 1: ICAM Conceptual Diagram FICAM Targets Figure 11: Federal Enterprise

More information

Technical Implementation Guidance: Smart Card Enabled Physical Access Control Systems Draft Version 2.3E

Technical Implementation Guidance: Smart Card Enabled Physical Access Control Systems Draft Version 2.3E Technical Implementation Guidance: Smart Card Enabled Physical Access Control Systems Draft Version 2.3E Approved by: Government Smart Card Interagency Advisory Board Prepared by: Physical Access Interagency

More information

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Jack Radzikowski,, Northrop Grumman & FiXs Smart Card Alliance Annual Meeting La Jolla, California

More information

Interagency Advisory Board Meeting Agenda, February 2, 2009

Interagency Advisory Board Meeting Agenda, February 2, 2009 Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,

More information

Interagency Advisory Board Meeting Agenda, March 5, 2009

Interagency Advisory Board Meeting Agenda, March 5, 2009 Interagency Advisory Board Meeting Agenda, 1. Opening Remarks (Tim Baldridge, NASA) 2. Federal Identity, Credential, and Access Management (ICAM) The Future of the Government s IDM Strategy (Judy Spencer,

More information

Single Secure Credential to Access Facilities and IT Resources

Single Secure Credential to Access Facilities and IT Resources Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access

More information

000027

000027 000026 000027 000028 000029 000030 EXHIBIT A 000031 Homeland Security Presidential Directive/Hspd-12 For Immediate Release Office of the Press Secretary August 27, 2004 Homeland Security Presidential Directive/Hspd-12

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Total Operational Security Roger Roehr Executive Director, Roehr Consulting 8 th Annual Smart Cards

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop Access Security Usage Models for PIV I Trusted Identity Credentials Roger Roehr

More information

Physical Access End-to-End Security

Physical Access End-to-End Security Physical Access End-to-End Security Smart Card Alliance Smart Cards in Government-2003 July 16, 2003 Physical Access 3:45 PM Robert Merkert Director, Strategic Accounts All Company and/or product names

More information

Mandate. Delivery. with evolving. Management and credentials. Government Federal Identity. and. Compliance. using. pivclasss replace.

Mandate. Delivery. with evolving. Management and credentials. Government Federal Identity. and. Compliance. using. pivclasss replace. Simplifying Compliance with the U.S. Government Federal Identity Mandate The first in a series of papers on HID Global ss Federal Identity Initiative and Delivery Strategy U.S. government agencies are

More information

Interagency Advisory Board Meeting Agenda, December 7, 2009

Interagency Advisory Board Meeting Agenda, December 7, 2009 Interagency Advisory Board Meeting Agenda, December 7, 2009 1. Opening Remarks 2. FICAM Segment Architecture & PIV Issuance (Carol Bales, OMB) 3. ABA Working Group on Identity (Tom Smedinghoff) 4. F/ERO

More information

Identiv FICAM Readers

Identiv FICAM Readers Identiv FICAM Readers Ordering Guide August 2017 Table of Contents Overview.....1 Basic FICAM Implementation.....3 Migration Strategies... 4 Perimeter Access... 4 Update Readers and Controllers... 4 Ad

More information

Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013

Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013 Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013 1. Opening Remarks 2. A Security Industry Association (SIA) Perspective on the Cost and Methods for Migrating PACS Systems to Use PIV

More information

The Leader in Unified Access and Intrusion

The Leader in Unified Access and Intrusion Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP 800-116, FIPS 201 and OMB M 11-11 in a High Assurance Trusted FICAM Platform In Partnership with: The Leader

More information

FICAM Configuration Guide

FICAM Configuration Guide UTC Fire & Security Americas Corporation, Inc. 1212 Pittsford-Victor Road Pittsford, New York 14534 USA Tel 866.788.5095 Fax 585.248.9185 www.lenel.com Overview FICAM Configuration Guide The instructions

More information

PIV Data Model Test Guidelines

PIV Data Model Test Guidelines This publication is available free of charge from http://csrc.nist.gov/publications/ Draft NIST Special Publication 800-85B-4 PIV Data Model Test Guidelines Ramaswamy Chandramouli Hildegard Ferraiolo Ketan

More information

Revision 2 of FIPS 201 and its Associated Special Publications

Revision 2 of FIPS 201 and its Associated Special Publications Revision 2 of FIPS 201 and its Associated Special Publications Hildegard Ferraiolo PIV Project Lead NIST ITL Computer Security Division Hildegard.ferraiolo@nist.gov IAB meeting, December 4, 2013 FIPS 201-2

More information

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006 PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy

More information

DoD & FiXs : Identity Superiority

DoD & FiXs : Identity Superiority DoD & FiXs : Identity Superiority Implementing common authentication now & into the future. The Federation for Identity and Cross-Credentialing Systems (FiXs) www.fixs.org FiXs - The Federation for Identity

More information

Paul A. Karger

Paul A. Karger Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program Paul A. Karger karger@watson.ibm.com Outline Identify specific problem with FIPS 201 Problem of

More information

Smart Card Alliance Update. Update to the Interagency Advisor Board (IAB) June 27, 2012

Smart Card Alliance Update. Update to the Interagency Advisor Board (IAB) June 27, 2012 Smart Card Alliance Update Update to the Interagency Advisor Board (IAB) June 27, 2012 Industry s Access Control Payments (NEW) Mobile & NFC Identity Industry s Healthcare Transportation Access Control

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

Using PIV Technology Outside the US Government

Using PIV Technology Outside the US Government Using PIV Technology Outside the US Government Author: Bob Dulude Publishing: 10/19/15 Introduction A common perception of many who have heard of the US Government s Personal Identity Verification (PIV)

More information

TWIC Readers What to Expect

TWIC Readers What to Expect TWIC Readers What to Expect Walter Hamilton Chairman International Biometric Industry Association Walter Hamilton International Biometric Industry Association 1155 F Street, NW Washington, DC 20004 (727)

More information

Office of Transportation Vetting and Credentialing. Transportation Worker Identification Credential (TWIC)

Office of Transportation Vetting and Credentialing. Transportation Worker Identification Credential (TWIC) Office of Transportation Vetting and Credentialing Transportation Worker Identification Credential (TWIC) Program Briefing for the American Association of Port Authorities Chicago, IL 27 April 2005 TWIC

More information

Interagency Advisory Board (IAB) Meeting. August 09, 2005

Interagency Advisory Board (IAB) Meeting. August 09, 2005 Interagency Advisory Board (IAB) Meeting August 09, 2005 Agenda National Institute of Standards and Technology (NIST) Discussion on Reference Implementation and Conformance Testing IAB Working Group Updates

More information

Version 3.4 December 01,

Version 3.4 December 01, FIXS OPERATING RULES Version 3.4 December 01, 2015 www.fixs.org Copyright 2015 by the Federation for Identity and Cross-Credentialing Systems, Inc. All Rights Reserved Printed in the United States of America

More information

How to Plan, Procure & Deploy a PIV-Enabled PACS

How to Plan, Procure & Deploy a PIV-Enabled PACS How to Plan, Procure & Deploy a PIV-Enabled PACS Access Control Council Webinar Series Session Two: Facility Characteristics & Risk Assessment Introductions Randy Vanderhoof, Secure Technology Alliance

More information

CREDENTSYS CARD FAMILY

CREDENTSYS CARD FAMILY CREDENTSYS CARD FAMILY Credentsys is a secure smart card family that is designed for national ID systems, passports, and multi-use enterprise security environments. The family is certified to FIPS 140-2

More information

PRODUCT INFORMATION BULLETIN

PRODUCT INFORMATION BULLETIN PRODUCT INFORMATION BULLETIN ID-One PIV v2.3.2 The electronic Identity card compliant with US specifications for electronic Table of contents 1. Foreword... 3 2. Introduction to PIV cards features... 4

More information

Guidelines for the Use of PIV Credentials in Facility Access

Guidelines for the Use of PIV Credentials in Facility Access NIST Special Publication 800-116 Revision 1 Guidelines for the Use of PIV Credentials in Facility Access Hildegard Ferraiolo Ketan Mehta Nabil Ghadiali Jason Mohler Vincent Johnson Steven Brady This publication

More information

An Overview of Draft SP Derived PIV Credentials and Draft NISTIR 7981 Mobile, PIV, and Authentication

An Overview of Draft SP Derived PIV Credentials and Draft NISTIR 7981 Mobile, PIV, and Authentication An Overview of Draft SP 800-157 Derived PIV Credentials and Draft NISTIR 7981 Mobile, PIV, and Authentication Hildegard Ferraiolo PIV Project Lead NIST ITL Computer Security Division Hildegard.ferraiolo@nist.gov

More information

Security Management Models And Practices Feb 5, 2008

Security Management Models And Practices Feb 5, 2008 TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related

More information

The SafeNet Security System Version 3 Overview

The SafeNet Security System Version 3 Overview The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products

More information

Secure Government Computing Initiatives & SecureZIP

Secure Government Computing Initiatives & SecureZIP Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS

More information

Smart Cards & Credentialing in the Federal Government

Smart Cards & Credentialing in the Federal Government Smart Cards & Credentialing in the Federal Government Smart Card Alliance 13 Feb 2003 Salt Lake City Bill Holcombe GSA Office of Governmentwide Policy New Urgency for Credentialing Solutions Post 9/11

More information

No More Excuses: Feds Need to Lead with Strong Authentication!

No More Excuses: Feds Need to Lead with Strong Authentication! No More Excuses: Feds Need to Lead with Strong Authentication! Dr. Sarbari Gupta sarbari@electrosoft-inc.com Annual NCAC Conference on Cybersecurity March 16, 2016 Electrosoft Services, Inc. 1893 Metro

More information

Biometrics. Overview of Authentication

Biometrics. Overview of Authentication May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication

More information

Match On Card MINEX 2

Match On Card MINEX 2 Match On Card MINEX 2 CTST 2008 Conference Consuelo Bangs Sagem Morpho, Inc. What is MOC? Match on Card (MOC) is the process of sending a biometric template from a live capture device to the card The card

More information

There is an increasing desire and need to combine the logical access and physical access functions of major organizations.

There is an increasing desire and need to combine the logical access and physical access functions of major organizations. Introduction There is an increasing desire and need to combine the logical access and physical access functions of major organizations. This can be as simple as merely having an access card that can be

More information

I N F O R M A T I O N S E C U R I T Y

I N F O R M A T I O N S E C U R I T Y NIST Special Publication 800-73-2 2 nd DRAFT Interfaces for Personal Identity Verification Part 1: End-Point PIV Card Application Namespace, Data Model, and Representation James F. Dray Scott B. Guthery

More information

HITPC Stage 3 Request for Comments Smart Card Alliance Comments January, 14, 2013

HITPC Stage 3 Request for Comments Smart Card Alliance Comments January, 14, 2013 HITPC Stage 3 Request for Comments Smart Card Alliance Comments January, 14, 2013 The Smart Card Alliance hereby submits the following comments regarding the Health Information Technology Policy Committee

More information

Keith Ward Northrop Grumman IT Smart Card Security Solutions June 04, 2002

Keith Ward Northrop Grumman IT Smart Card Security Solutions June 04, 2002 Physical and Logical Security Solutions Smart Card Alliance Keith Ward Northrop Grumman IT Smart Card Security Solutions June 04, 2002 1 Outline Homeland Security Mission Spectrum Market Assessment Identification

More information

Federated Access. Identity & Privacy Protection

Federated Access. Identity & Privacy Protection Federated Access Identity & Privacy Protection Presented at: Information Systems Security Association-Northern Virginia (ISSA-NOVA) Chapter Meeting Presented by: Daniel E. Turissini Board Member, Federation

More information

pivclass FIPS-201 Reader Operation and Output Selections APPLICATION NOTE , F.0 February Barranca Parkway Irvine, CA 92618

pivclass FIPS-201 Reader Operation and Output Selections APPLICATION NOTE , F.0 February Barranca Parkway Irvine, CA 92618 15370 Barranca Parkway Irvine, CA 92618 pivclass FIPS-201 Reader Operation and Output Selections APPLICATION NOTE 6090-905, F.0 February 2014. Contents 1 Overview... 4 2 CHUID Definition... 4 3 FASC-N

More information

PKI and FICAM Overview and Outlook

PKI and FICAM Overview and Outlook PKI and FICAM Overview and Outlook Stepping Stones 2001 FPKIPA Established Federal Bridge CA established 2003 E-Authentication Program Established M-04-04 E-Authentication Guidance for Federal Agencies

More information

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 DFARS 252.204-7012 Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 As with most government documents, one often leads to another. And that s the case with DFARS 252.204-7012.

More information

Certification Authority

Certification Authority Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying

More information

Strong Authentication for Physical Access using Mobile Devices

Strong Authentication for Physical Access using Mobile Devices Strong Authentication for Physical Access using Mobile Devices DoD Identity Protection and Management Conference May 15-17, 2012 Dr. Sarbari Gupta, CISSP, CISA sarbari@electrosoft-inc.com 703-437-9451

More information

National Identity Exchange Federation. Trustmark Signing Certificate Policy. Version 1.0. Published October 3, 2014 Revised March 30, 2016

National Identity Exchange Federation. Trustmark Signing Certificate Policy. Version 1.0. Published October 3, 2014 Revised March 30, 2016 National Identity Exchange Federation Trustmark Signing Certificate Policy Version 1.0 Published October 3, 2014 Revised March 30, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents

More information

Mobile Validation Solutions

Mobile Validation Solutions 227 Mobile Validation Solutions John Bys Executive Vice President Copyright 2007, CoreStreet, Ltd. Who has requirements? Maritime Safety Transportation Act Ports / MTSA Facilities Vehicle check points

More information

TWIC Update to Sector Delaware Bay AMSC 8 June 2018

TWIC Update to Sector Delaware Bay AMSC 8 June 2018 TWIC Update to Sector Delaware Bay AMSC 8 June 2018 Agenda TWIC Program Metrics TWIC Next Generation (NexGen Physical Features) Credential Modes of Operation Canceled Card List Mobile App TWIC Assessments

More information

FPKIPA CPWG Antecedent, In-Person Task Group

FPKIPA CPWG Antecedent, In-Person Task Group FBCA Supplementary Antecedent, In-Person Definition This supplement provides clarification on the trust relationship between the Trusted Agent and the applicant, which is based on an in-person antecedent

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such

More information

TWIC Reader Technology Phase

TWIC Reader Technology Phase TWIC Reader Technology Phase Deploying and Using TWIC Fixed Readers Lessons learned Bob Samuel Senior Biometric Technology Product MorphoTrak, Inc. June 10, 2009 Seattle, WA 1 Lessons learned while participating

More information

Leveraging the LincPass in USDA

Leveraging the LincPass in USDA Leveraging the LincPass in USDA Two Factor Authentication, Digital Signature, Enterprise VPN, eauth Single Sign On February 2010 USDA Takes Advantage of the LincPass USDA is taking advantage of the LincPass

More information

Identiv TS Readers. Ordering Guide. October 2016

Identiv TS Readers. Ordering Guide. October 2016 Identiv TS Readers Ordering Guide October 2016 Table of Contents Introduction... 3 Identiv TS Readers Description... 3 TS Reader Ordering Processes... 5 Installation and User Manual... 9 Compliance and

More information

NFC Identity and Access Control

NFC Identity and Access Control NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity

More information

The Open Protocol for Access Control Identification and Ticketing with PrivacY

The Open Protocol for Access Control Identification and Ticketing with PrivacY The Open Protocol for Access Control Identification and Ticketing with PrivacY For Secure Contactless Transactions and Enabling Logical and Physical Access Convergence October 2010 Actividentity 2 OPACITY

More information

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-

More information

Thursday, May 15. Track D Security & Access Control

Thursday, May 15. Track D Security & Access Control Thursday, May 15 Track D Security & Access Control Session: PKI Logical Access Technology & Applications Time: 10:15 AM 12:00 PM Room: W204 D Moderator: Steve Howard VP, Business Development, Identity

More information

PIV-Interoperable Credential Case Studies

PIV-Interoperable Credential Case Studies PIV-Interoperable Credential Case Studies A Smart Card Alliance Identity Council White Paper Publication Date: February 2012 Publication Number: IC-12001 Smart Card Alliance 191 Clarksville Rd. Princeton

More information

Indeed Card Management Smart card lifecycle management system

Indeed Card Management Smart card lifecycle management system Indeed Card Management Smart card lifecycle management system Introduction User digital signature, strong authentication and data encryption have become quite common for most of the modern companies. These

More information

CertiPath TrustVisitor and TrustManager. The need for visitor management in FICAM Compliant PACS

CertiPath TrustVisitor and TrustManager. The need for visitor management in FICAM Compliant PACS CertiPath TrustVisitor and TrustManager The need for visitor management in FICAM Compliant PACS CertiPath TrustMonitor CertiPath TrustVisitor and TrustManager The need for visitor management in FICAM Compliant

More information

Interagency Advisory Board Meeting Agenda, July 28, 2010

Interagency Advisory Board Meeting Agenda, July 28, 2010 Interagency Advisory Board Meeting Agenda, July 28, 2010 1. Opening Remarks 2 Research Collaboration in the Cloud: How NCI and Research Partners Are Improving Business Processes using Digital Identities

More information

Technical Trust Policy

Technical Trust Policy Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality

More information